CN103404112A - Vehicle network system - Google Patents
Vehicle network system Download PDFInfo
- Publication number
- CN103404112A CN103404112A CN2012800113475A CN201280011347A CN103404112A CN 103404112 A CN103404112 A CN 103404112A CN 2012800113475 A CN2012800113475 A CN 2012800113475A CN 201280011347 A CN201280011347 A CN 201280011347A CN 103404112 A CN103404112 A CN 103404112A
- Authority
- CN
- China
- Prior art keywords
- control unit
- signal
- authentication
- key
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 claims abstract description 105
- 238000000034 method Methods 0.000 claims abstract description 31
- 230000008929 regeneration Effects 0.000 claims description 5
- 238000011069 regeneration method Methods 0.000 claims description 5
- 238000012217 deletion Methods 0.000 claims 1
- 230000037430 deletion Effects 0.000 claims 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 abstract description 125
- 238000000605 extraction Methods 0.000 description 35
- 238000012545 processing Methods 0.000 description 32
- 230000006870 function Effects 0.000 description 25
- 238000011156 evaluation Methods 0.000 description 16
- 238000010586 diagram Methods 0.000 description 13
- 238000004364 calculation method Methods 0.000 description 9
- 230000014759 maintenance of location Effects 0.000 description 8
- 238000012546 transfer Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000001172 regenerating effect Effects 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 230000002411 adverse Effects 0.000 description 1
- 238000004378 air conditioning Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/40—Bus networks
- H04L12/403—Bus networks with centralised control, e.g. polling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/40—Bus networks
- H04L2012/40208—Bus networks characterized by the use of a particular bus standard
- H04L2012/40215—Controller Area Network CAN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/40—Bus networks
- H04L2012/40267—Bus for use in transportation systems
- H04L2012/40273—Bus for use in transportation systems the transportation system being a vehicle
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/84—Vehicles
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Small-Scale Networks (AREA)
Abstract
在车辆网络系统中,将多个ECU网络连接。该多个ECU包括:第一ECU(20),在第一ECU(20)中被设定有来自于形成一对的私密密钥和(K1)公开密钥(K2)当中的私密密钥(K1),并且基于当创建车辆网络系统时执行的初始化处理来设定私密密钥和公开密钥;和第二ECU(21),在该第二ECU(21)中被设定有公开密钥(K2)。第二ECU(21)将由公开密钥(K2)和能够指定第二ECU(21)的信息创建的认证关键字(43)添加到传送信号,并且将具有被添加的认证关键字的传送信号传送到网络(29)。第一ECU(20)获取认证关键字(43)并且基于所获取的认证关键字(43)和私密密钥(K1)来评估通信信号的可靠性。
In the vehicle network system, multiple ECUs are networked. The plurality of ECUs includes: a first ECU (20), in which a private key ( K1), and the private key and the public key are set based on the initialization process performed when the vehicle network system is created; and the second ECU (21) in which the public key is set (K2). The second ECU (21) adds the authentication key (43) created by the public key (K2) and information capable of specifying the second ECU (21) to the transmission signal, and transmits the transmission signal with the added authentication key to the network (29). The first ECU (20) acquires the authentication key (43) and evaluates the reliability of the communication signal based on the acquired authentication key (43) and the secret key (K1).
Description
技术领域technical field
本发明涉及一种车辆网络系统,其中被安装在车辆上的多个电子控制单元被相互网络连接并且交换信息。The present invention relates to a vehicle network system in which a plurality of electronic control units mounted on a vehicle are network-connected to each other and exchange information.
背景技术Background technique
通过将被安装在车辆上的多个电子控制单元(electronic controlunit:ECU)经由网络相互连接,能够配置将会使得能够交换ECU具有的信息(车辆信息)的车辆网络系统。在这样的车辆网络系统中,通常在网络连接的ECU之间能够容易地交换车辆信息。同时,也容易错误地或有意地将被连接到网络的装置拆卸,或者错误地或有意地将装置附接到网络。因此,在从网络意外地拆卸装置或者意料之外的装置被附接到网络的情况下,能够发生对网络的未授权的访问或者能够影响车辆信息的交换。因此,日本专利申请公开No.2005-1534(JP2005-1534A)描述能够适于通过拆卸等等移除组成车辆网络系统的ECU的情况的系统的示例。By interconnecting a plurality of electronic control units (ECUs) mounted on a vehicle via a network, it is possible to configure a vehicle network system that will enable exchange of information (vehicle information) that the ECUs have. In such a vehicle network system, it is generally possible to easily exchange vehicle information between network-connected ECUs. Meanwhile, it is also easy to mistakenly or intentionally detach a device connected to a network, or mistakenly or intentionally attach a device to a network. Thus, in the event of accidental detachment of a device from the network or attachment of an unexpected device to the network, unauthorized access to the network can occur or the exchange of vehicle information can be affected. Therefore, Japanese Patent Application Publication No. 2005-1534 (JP 2005-1534A) describes an example of a system that can be adapted to a case where an ECU constituting a vehicle network system is removed by disassembly or the like.
在JP2005-1534A中描述的系统中,假定车辆网络系统,其中,例如,通过网络(通信线)将通信ECU、引擎ECU、汽车导航ECU和空调ECU可通信地相互连接。由于通过在这样的系统中的各个ECU执行连接识别,当检测到与任何ECU(已安装的装置)的连接异常时,此装置或者其它ECU(已安装的装置)的操作被停止。因此,当从车辆拆卸任何已安装的装置时,防止其它已安装的装置作为装置组正常地操作。结果,在这样的情况下有效地防止包括装置拆卸的未认证的行为,即,车辆盗窃。In the system described in JP2005-1534A, a vehicle network system is assumed in which, for example, a communication ECU, an engine ECU, a car navigation ECU, and an air-conditioning ECU are communicably connected to each other through a network (communication lines). Since connection identification is performed by each ECU in such a system, when an abnormality in connection with any ECU (installed device) is detected, the operation of this device or other ECUs (installed device) is stopped. Therefore, when any installed device is detached from the vehicle, other installed devices are prevented from operating normally as a device group. As a result, unauthorized actions including device disassembly, that is, vehicle theft are effectively prevented in such a case.
因此,在JP2005-1534A中描述的系统能够适于拆卸装置的情况,但是不能够被必要地适当地适于添加未认证的装置的情况。因此,系统不能够确保针对与装置的添加相关联的频繁的未认证的访问的安全性,诸如重放攻击,其中通过未认证地使用已经被传送到网络的正常信号而生成的伪信号(alias)被传送到网络。Therefore, the system described in JP2005-1534A can be adapted to the case of detaching a device, but cannot be necessarily properly adapted to the case of adding an unauthenticated device. Therefore, the system cannot ensure security against frequent unauthenticated access associated with addition of devices, such as a replay attack in which a fake signal (alias ) are sent to the network.
例如,在经常被用作车辆网络的控制局域网(control area network:CAN)中,传送装置传送被指派有已经被分配给传送装置的标识符(CAN ID)的信号,并且接收装置基于被添加到该信号的标识符确定传送该信号的装置和信号的内容。如在图12A中所示,在将包括标识符“XX”和数据“123...”的传送信号TD110从作为传送装置的ECU_A110输出到网络120的情况下,ECU_B111、ECU_C112、以及ECU_N113起接收装置的作用,该接收装置通常获得以传送信号TD110为基础的、包括标识符“XX”和数据“123...”的接收信号RD111至RD113。同时,如在图12B中所示,在不合适的ECU_A130被连接到网络系统100的情况下,不合适的ECU_A130能够使用由作为正常传送装置的ECU_A110使用的标识符“XX”,来输出包括不合适的数据“999...”的传送信号TD130。结果,ECU_B111、ECU_C112、以及ECU_N113获得包括标识符“XX”和数据“999...”的接收信号RD131至RD133。在这样的情况下,尽管传送信号不属于不合适的ECU_A130,但是ECU_B111、ECU_C112、以及ECU_N113确定此信号来自于ECU_A110并且基于不合适的数据执行处理。因此,通过对由CAN构成的网络系统100的未认证的访问,不合适的ECU_A130能够冒充是正常的ECU_A110,并且随着网络领域中最近进步,这也变成车辆的问题。For example, in a control area network (CAN) that is often used as a vehicle network, a transmitting device transmits a signal assigned an identifier (CAN ID) that has been assigned to the transmitting device, and the receiving device based on the The identifier of the signal identifies the device transmitting the signal and the content of the signal. As shown in FIG. 12A , in the case of outputting a transmission signal TD110 including an identifier “XX” and data “123 . The receiving device normally obtains a received signal RD111 to RD113 based on the transmitted signal TD110 and comprising the identifier "XX" and the data "123...". Meanwhile, as shown in FIG. 12B , in the case where an unsuitable ECU_A130 is connected to the
在具有高装置处理容量或者高网络数据传输容量的系统中,通过使用诸如每次传送和接收信号时执行加密的加密套接字协议层(SSL)的高级加密协议,显然能够防止未认证的访问,但是因为对于高级加密协议的处理要求高负载计算,所以在车辆网络系统中使用要求这种高负载计算的协议是不现实的,在车辆网络系统中计算容量和数据传输容量被减少到必要的最小限制。In systems with high device processing capacity or high network data transmission capacity, it is obviously possible to prevent unauthorized access by using advanced encryption protocols such as Secure Sockets Layer (SSL) that performs encryption every time a signal is transmitted and received , but since high-load calculations are required for the processing of advanced encryption protocols, it is unrealistic to use protocols requiring such high-load calculations in vehicle network systems, where the calculation capacity and data transmission capacity are reduced to necessary minimum limit.
发明内容Contents of the invention
本发明提供一种车辆网络系统,该车辆网络系统能够适当地确保在多个网络连接的电子控制单元之间的有限通信容量条件下的通信信号的可靠性。The present invention provides a vehicle network system capable of appropriately ensuring the reliability of communication signals under the condition of limited communication capacity between a plurality of network-connected electronic control units.
在根据本发明的一个方面的车辆网络系统中,多个控制单元被提供在车辆上并且被可通信地相互网络连接。该车辆网络系统被提供有多个控制单元,该多个控制单元被提供在车辆上并且被可通信地相互网络连接。该多个控制单元包括:第一控制单元,在该第一控制单元中被设定有来自于形成一对的私密密钥和公开密钥当中的私密密钥,并且通过执行用于激活系统的初始化处理来设定私密密钥和公开密钥;和第二控制单元,在该第二控制单元中被设定有公开密钥。第二控制单元被配置成由公开密钥和能够指定第二控制装置的信息来创建认证信息,将认证信息添加到要被传送到其他控制单元的通信信号,并且将具有被添加的认证信息的通信信号传送到网络。第一控制单元被配置成获取已经被添加到从第二控制单元传送的通信信号的认证信息,并且基于所获取的认证信息和私密密钥来评估通信信号的可靠性。In a vehicle network system according to an aspect of the present invention, a plurality of control units are provided on a vehicle and are communicably network-connected to each other. The vehicle network system is provided with a plurality of control units provided on a vehicle and communicably networked with each other. The plurality of control units include: a first control unit in which a private key from among a private key and a public key forming a pair is set, and by executing the an initialization process to set a private key and a public key; and a second control unit in which the public key is set. The second control unit is configured to create authentication information from the public key and information capable of specifying the second control device, add the authentication information to a communication signal to be transmitted to other control units, and will have the added authentication information The communication signal is sent to the network. The first control unit is configured to acquire authentication information that has been added to the communication signal transmitted from the second control unit, and evaluate reliability of the communication signal based on the acquired authentication information and the private key.
根据上述第一方面,因为当执行初始化处理时设定公开密钥,所以与认证信息一起传送通信信号的单元被指定为当执行初始化处理时被包括在车辆网络系统中的单元。结果,因为具有被添加的认证信息的所传送的通信信号由此被指定为从在初始化处理期间就被包括在车辆网络系统中的单元传送的信号,所以确保了其可靠性。结果,通信信号的可靠性能够增加。According to the first aspect described above, since the public key is set when the initialization process is performed, the unit that transmits the communication signal together with the authentication information is specified as a unit included in the vehicle network system when the initialization process is performed. As a result, since the transmitted communication signal with the authentication information added is thus specified as a signal transmitted from a unit included in the vehicle network system during the initialization process, its reliability is ensured. As a result, the reliability of communication signals can be increased.
在存储了已经由此创建的认证信息的情况下,没有必要再次创建此认证信息,并且在通信信号的后续传送中,第二控制单元的处理容量能够被维持在常规的水平,而不添加对于创建认证信息所需要的负载。In the case of storing the authentication information which has thus been created, there is no need to create this authentication information again, and in the subsequent transmission of the communication signal, the processing capacity of the second control unit can be maintained at a conventional level without adding to the Create the payload required for authentication information.
此外,因为已经通过公开密钥被加密的认证信息的内容没有被篡改,所以具有被添加的认证信息的通信信号的可靠性也能够增加。Furthermore, since the content of the authentication information that has been encrypted by the public key has not been falsified, the reliability of the communication signal with the added authentication information can also be increased.
在第一方面中,第二控制单元可以被配置成将认证信息划分为多个信息条,将已经通过划分获得的所划分的认证信息顺序地添加到通信信号,并且传送具有被添加的所划分的认证信息的通信信号。第一控制单元可以被配置成顺序地接收通信信号,由所划分的认证信息重新配置在划分之前的认证信息,并且基于所重新配置的认证信息来评估通信信号的可靠性。In the first aspect, the second control unit may be configured to divide the authentication information into a plurality of pieces of information, sequentially add the divided authentication information that has been obtained through division to the communication signal, and transmit the The communication signal of the authentication information. The first control unit may be configured to sequentially receive the communication signal, reconfigure the authentication information before the division from the divided authentication information, and evaluate the reliability of the communication signal based on the reconfigured authentication information.
通过上述配置,因为传送了经划分的认证信息,所以与将整个认证信息添加到各个传送的通信信号的情况相比较,能够减少需要确保可靠性的通信数据的量。特别地,在被设计为具有最低要求的容量和功能的车辆网络系统的情况下,能够增加通信信号的可靠性,同时抑制与用于增加通信信号的可靠性的功能增强相关联的成本的增加。With the above-described configuration, since divided authentication information is transmitted, the amount of communication data required to ensure reliability can be reduced compared to the case where the entire authentication information is added to each transmitted communication signal. In particular, in the case of a vehicle network system designed to have the minimum required capacity and functions, it is possible to increase the reliability of communication signals while suppressing an increase in cost associated with functional enhancement for increasing the reliability of communication signals .
在上述方面中,第一控制单元可以被配置成通过执行初始化处理来生成私密密钥和公开密钥,并且可以将私密密钥设定到第一控制单元本身并将公开密钥设定到第二控制单元。In the above aspect, the first control unit may be configured to generate a private key and a public key by performing initialization processing, and may set the private key to the first control unit itself and the public key to the second Two control units.
通过上述配置,因为第一控制单元当执行初始化处理时生成私密密钥和公开密钥,所以消除了事先泄漏关于私密密钥和公开密钥的信息的可能性。With the above-described configuration, since the first control unit generates the private key and the public key when performing initialization processing, the possibility of leaking information on the private key and the public key in advance is eliminated.
在上述方面中,第一控制单元可以经由网络将公开密钥设定到第二控制单元。In the above aspect, the first control unit may set the public key to the second control unit via a network.
通过上述配置,公开密钥能够被精确地和有效地分发到构成车辆网络系统的适当的控制单元。With the above configuration, the public key can be accurately and efficiently distributed to appropriate control units constituting the vehicle network system.
在上述方面中,第二控制单元可以在设定公开密钥的定时处创建认证信息。In the above aspect, the second control unit may create the authentication information at a timing when the public key is set.
通过上述配置,因为当设定公开密钥时创建认证信息,所以当传送通信信号时没有生成与创建认证信息相关联的处理负荷,并且防止在第二控制单元中的处理负荷的增加。With the above configuration, since the authentication information is created when the public key is set, the processing load associated with creating the authentication information is not generated when the communication signal is transmitted, and an increase in the processing load in the second control unit is prevented.
在上述方面中,在创建认证信息之后,第二控制单元可以删除已经被设定的公开密钥。In the above aspect, after the authentication information is created, the second control unit may delete the public key that has been set.
通过上述配置,因为在已经创建认证信息之后公开密钥本身不是必要的,所以通过留下用于评估通信信号的可靠性的认证信息并且删除公开密钥而防止了公开密钥的泄漏并且进一步增加通信信号的可靠性。With the above configuration, since the public key itself is not necessary after the authentication information has been created, leakage of the public key is prevented and further increased by leaving the authentication information for evaluating the reliability of the communication signal and deleting the public key. reliability of communication signals.
在上述方面中,每次启动车辆网络系统时,在传送通信信号之前,第二控制单元将认证信息传送到网络,并且第一控制单元可以被配置成获取并且存储在从第二控制单元接收通信信号之前已经接收的认证信息,并且通过将所存储的认证信息与被添加到通信信号的认证信息相比较,来评估通信信号的可靠性。In the above aspect, each time the vehicle network system is started, before transmitting the communication signal, the second control unit transmits the authentication information to the network, and the first control unit may be configured to obtain and store the communication information received from the second control unit. Authentication information that has been previously received for the signal, and the authenticity of the communication signal is evaluated by comparing the stored authentication information with the authentication information added to the communication signal.
通过上述配置,通过每次启动车辆网络系统时在传送通信信号之前传送的认证信息来认证传送需要评估可靠性的通信信号的控制单元,第一控制单元能够执行通信信号的可靠性评估,而不受系统配置的变化影响。此外,在这样的情况下,不要求在第一控制单元中事先登记传送需要评估可靠性的通信信号的控制单元。因此,也增加系统的柔韧性。With the above configuration, the first control unit can perform reliability evaluation of the communication signal by authenticating the control unit that transmits the communication signal that needs to be evaluated for reliability by authenticating the control unit that transmits the communication signal that needs to be evaluated by the authentication information that is transmitted before transmitting the communication signal every time the vehicle network system is started, without Affected by changes in system configuration. Furthermore, in such a case, the control unit that transmits the communication signal requiring evaluation of reliability is not required to be previously registered in the first control unit. Thus, the flexibility of the system is also increased.
在上述方面中,第一控制单元可以被配置成当确定由第二控制单元传送的通信信号不可靠时,禁止在车辆网络系统中使用该通信信号。In the above aspect, the first control unit may be configured to prohibit use of the communication signal in the vehicle network system when it is determined that the communication signal transmitted by the second control unit is unreliable.
通过上述配置,当冒充第二控制单元的单元被连接到车辆网络系统并且未认证的信号被传送到车辆网络系统时,从车辆网络系统消除未认证的信号的影响。结果,能够抑制未认证的信号不利地影响车辆网络系统的可能性。With the above configuration, when a unit masquerading as the second control unit is connected to the vehicle network system and an unauthenticated signal is transmitted to the vehicle network system, the influence of the unauthenticated signal is eliminated from the vehicle network system. As a result, the possibility of an unauthenticated signal adversely affecting the vehicle network system can be suppressed.
在根据本发明的第二方面的车辆网络系统中,被提供在车辆上的多个控制单元被可通信地相互网络连接。车辆网络系统包括多个控制单元,该多个控制单元被提供在车辆上并且被可通信地相互网络连接。该多个控制单元包括第一控制单元,在该第一控制单元中被设定有来自于形成一对的私密密钥和公开密钥当中的私密密钥,并且私密密钥和公开密钥通过执行用于激活系统的初始化处理而被设定;和第二控制单元,在该第二控制单元中被设定有公开密钥。第一控制单元被配置成经由网络将通信信号传送到其他控制单元,并且也传送基于私密密钥和原始认证数据创建的认证信号,其中基于通信信号生成原始认证数据,并且第二控制单元被配置成接收通信信号和认证信号,并且基于再生认证数据和解码认证数据的比较来评估该通信信号的可靠性,其中基于所接收的通信信号来生成再生认证数据,基于认证信号和公开密钥来解码解码认证数据。In the vehicle network system according to the second aspect of the present invention, a plurality of control units provided on the vehicle are communicably networked with each other. The vehicle network system includes a plurality of control units provided on the vehicle and communicatively networked with each other. The plurality of control units includes a first control unit in which a private key from among a private key and a public key forming a pair is set, and the private key and the public key are passed through performing an initialization process for activating the system; and a second control unit in which a public key is set. The first control unit is configured to transmit a communication signal to other control units via a network, and also transmits an authentication signal created based on a private key and original authentication data, wherein the original authentication data is generated based on the communication signal, and the second control unit is configured to receive a communication signal and an authentication signal, and evaluate the reliability of the communication signal based on a comparison of reproduced authentication data generated based on the received communication signal and decoded authentication data, which is decoded based on the authentication signal and the public key Decode authentication data.
通过上述配置,因为当执行初始化处理时设定公开密钥,所以传送公开密钥的第一控制单元被指定为在执行初始化处理时已经被包括在车辆网络系统中的装置。第二控制单元能够通过从通信信号生成的再生认证数据与通过解码第一控制单元的认证信号获得的解码认证数据相比较,来确定命令信号的传送起源是第一控制单元并且通信信号没有被篡改。例如,在网络中流动的通信信号已经被篡改的情况下,与其相对应的认证数据不能被篡改。因此,能够检测到通信信号的篡改。结果,能够检测来自冒充第一控制装置的装置的假信号,并且能够增加通信信号的可靠性。With the above configuration, since the public key is set when the initialization process is performed, the first control unit that transmits the public key is designated as a device already included in the vehicle network system when the initialization process is performed. The second control unit is able to determine that the transmission origin of the command signal is the first control unit and that the communication signal has not been tampered with by comparing the reproduced authentication data generated from the communication signal with the decoded authentication data obtained by decoding the authentication signal of the first control unit . For example, in a case where a communication signal flowing in the network has been tampered with, authentication data corresponding thereto cannot be tampered with. Therefore, falsification of communication signals can be detected. As a result, a false signal from a device masquerading as the first control device can be detected, and the reliability of the communication signal can be increased.
此外,因为来自于第一控制装置的通信信号本身也被传送到网络,不评估通信信号的可靠性的其他控制装置能够被方便地用于从第一控制单元接收通信信号。因此,用于评估通信信号的可靠性的系统也能够被应用于已经存在的车辆网络系统。Furthermore, since the communication signal itself from the first control device is also transmitted to the network, other control devices that do not evaluate the reliability of the communication signal can be conveniently used to receive the communication signal from the first control unit. Therefore, the system for evaluating the reliability of communication signals can also be applied to already existing vehicle network systems.
在上述第二方面中,第一控制单元被配置成通过利用私密密钥对原始认证数据加密来生成该认证信号,其中通过将哈希函数应用于通信信号来计算原始认证数据,并且第二控制单元可以被配置成通过将该哈希函数应用于所接收的通信信号来计算再生认证数据,并且基于再生认证数据与通过对认证信号解码获得的解码认证数据的比较来评估通信信号的可靠性。In the above second aspect, the first control unit is configured to generate the authentication signal by encrypting original authentication data calculated by applying a hash function to the communication signal with a private key, and the second control unit The unit may be configured to calculate regenerated authentication data by applying the hash function to the received communication signal, and to evaluate the reliability of the communication signal based on a comparison of the regenerated authentication data with decoded authentication data obtained by decoding the authentication signal.
通过上述配置,通过使用哈希函数,能够从通信信号计算适当大小(强度)的认证数据。结果,在设计车辆网络系统时的柔韧性增加。With the above configuration, by using a hash function, authentication data of an appropriate size (strength) can be calculated from a communication signal. As a result, flexibility is increased when designing vehicle network systems.
在上述方面中,第一控制单元可以被配置成通过执行初始化处理来生成私密密钥和公开密钥,并且可以将私密密钥设定到第一控制单元本身并将公开密钥设定到第二控制单元。In the above aspect, the first control unit may be configured to generate a private key and a public key by performing initialization processing, and may set the private key to the first control unit itself and the public key to the second Two control units.
通过上述配置,因为第一控制单元当执行初始化处理时生成私密密钥和公开密钥,所以消除了事先泄露关于私密密钥和公开密钥的信息的可能性。With the above-described configuration, since the first control unit generates the private key and the public key when performing initialization processing, the possibility of leaking information on the private key and the public key in advance is eliminated.
在上述方面中,第一控制单元可以经由网络将公开密钥设定到第二控制单元。In the above aspect, the first control unit may set the public key to the second control unit via a network.
通过上述配置,公开密钥能够被精确地和有效地分发到构成车辆网络系统的适当的控制单元。With the above configuration, the public key can be accurately and efficiently distributed to appropriate control units constituting the vehicle network system.
附图说明Description of drawings
下面将会参考附图描述本发明的示例性实施例的特征、优点、以及技术和工业意义,其中相同的附图标记表示相同的元件,并且其中:The features, advantages, and technical and industrial significance of exemplary embodiments of the present invention will be described below with reference to the accompanying drawings, in which like reference numerals represent like elements, and in which:
图1是图示根据本发明的第一实施例的车辆网络系统的示意性配置的框图;1 is a block diagram illustrating a schematic configuration of a vehicle network system according to a first embodiment of the present invention;
图2是示意性地图示车辆网络系统的ECU如何生成认证关键字的示意图;2 is a diagram schematically illustrating how an ECU of a vehicle network system generates an authentication key;
图3A和图3B图示通过车辆网络系统的ECU添加到传送信号的经划分的认证关键字,图3A是示意性地图示如何通过划分认证关键字提取提取关键字的示意图,并且图3B是示意性地图示具有被添加的提取关键字的传送信号的数据格式的配置的示意图;3A and 3B illustrate divided authentication keywords added to the transmission signal by the ECU of the vehicle network system, FIG. 3A is a schematic diagram schematically illustrating how to extract keywords by dividing the authentication keyword, and FIG. 3B is a schematic diagram A schematic diagram schematically illustrating a configuration of a data format of a transmission signal with an added extraction keyword;
图4A和图4B是图示被执行以评估车辆网络系统中的通信信号的可靠性的处理的步骤的流程图,图4A是图示系统初始化处理的步骤的流程图,并且图4B是图示被执行以评估通信信号的可靠性的处理的步骤的流程图;4A and 4B are flowcharts illustrating the steps of a process performed to evaluate the reliability of communication signals in a vehicle network system, FIG. 4A is a flowchart illustrating the steps of a system initialization process, and FIG. 4B is a flowchart illustrating a flowchart of the steps of the process performed to assess the reliability of the communication signal;
图5是图示车辆网络系统的系统初始化处理的序列图;5 is a sequence diagram illustrating system initialization processing of the vehicle network system;
图6是图示车辆网络系统的连接管理处理的序列图;FIG. 6 is a sequence diagram illustrating connection management processing of the vehicle network system;
图7是图示车辆网络系统的数据认证处理的序列图;7 is a sequence diagram illustrating data authentication processing of the vehicle network system;
图8是图示根据本发明的第二实施例的车辆网络系统的示意性配置的框图;8 is a block diagram illustrating a schematic configuration of a vehicle network system according to a second embodiment of the present invention;
图9是示意性地图示在车辆网络系统中如何传送和接收信号的示意图;FIG. 9 is a diagram schematically illustrating how signals are transmitted and received in a vehicle network system;
图10是图示在车辆网络系统中传送信号的处理的步骤的流程图;FIG. 10 is a flowchart illustrating the steps of a process of transmitting a signal in a vehicle network system;
图11是图示被执行以基于在车辆网络系统中接收到的信号评估信号的可靠性的处理的步骤的流程图;以及11 is a flow chart illustrating the steps of a process performed to evaluate the reliability of a signal based on a signal received in a vehicle network system; and
图12A和图12B示意性地图示常规车辆网络系统的配置,图12A是图示正常状态下的信号的传送和接收的示意图,并且图12B是图示当未认证的访问已经发生时的信号的传送和接收的示意图。12A and 12B schematically illustrate the configuration of a conventional vehicle network system, FIG. 12A is a schematic diagram illustrating transmission and reception of signals in a normal state, and FIG. 12B is a schematic diagram illustrating signals when unauthenticated access has occurred. Schematic diagram of transmission and reception.
具体实施方式Detailed ways
(第一实施例)(first embodiment)
下面将会参考图1至图3解释根据本发明的车辆网络系统的第一实施例。A first embodiment of a vehicle network system according to the present invention will be explained below with reference to FIGS. 1 to 3 .
如在图1中所示,车辆10被提供有车辆网络系统,该车辆网络系统包括:第一至第四ECU20至23,其用作执行被安装在车辆上的装置的电子控制的单元;和网络29,其将第一至第四ECU20至23网络连接,使得ECU能够相互通信。As shown in FIG. 1 , a
网络29具有适合于将网络安装在车辆10上的规格。在本实施例中,作为常规网络的、用于车辆的控制局域网(CAN)被用作网络29。用于车辆的CAN具有例如每1秒(时间)500千比特的最大通信容量,并且作为其规格,能够在一个数据帧(大约5至13个字节)中包括最多8字节(64比特)。此外,在本实施例中,被包括在被传送到网络29的数据帧(传送信号)中的数据是所谓的车辆信息数据,诸如车辆速度、引擎温度、或者由ECU执行的处理的结果。The
第一至第四ECU20至23被提供有经由网络29相互通信的通信单元30。因为第一至第四ECU20至23的通信单元30具有相同的功能,所以下面将会仅详细地解释起第一控制单元作用的第一ECU20的通信单元30,并且为了方便解释,将会省略起第二控制单元作用的第二至第四ECU21至23的通信单元30的解释。The first to
第一ECU20的通信单元30接收用作包括从第二至第四ECU21至23传送的车辆信息数据的通信信号的传送信号,提取包含在已经接收到的传送信号中的车辆信息数据,并且在第一ECU20中使能各种类型的处理。为此,通信单元30从由网络29接收到的、由CAN协议的格式构成的传送信号去除要被用于网络通信处理的数据,诸如“CANID”,从而提取车辆信息数据,并且在车辆信息数据与“CAN ID”相关联的状态下将提取到的车辆信息数据存储在第一ECU20的存储装置中。“CAN ID”事先以一对一的比率与一个车辆信息数据相关联。因此,基于与其相关联的“CAN ID”,第一ECU20能够确定提取到的车辆信息数据的意义。相反地,当传送车辆信息数据时,第一ECU20的通信单元30生成包括从第一ECU20传送的车辆信息数据的传送信号并且将生成的传送信号传送到网络29。因此,第一ECU20的通信单元30将“CAN ID”等等添加到要传送的车辆信息数据,生成具有CAN协议格式的传送信号,并且将生成的传送信号传送到网络29。结果,第一至第四ECU20至23经由网络29相互交换各种类型的车辆信息数据。The
例如,第一至第四20至23是引擎ECU、刹车ECU、转向ECU以及驾驶辅助(导航系统)ECU。第一至第四ECU20至23被配置在微型计算机周围,该微型计算机被提供有计算装置、存储装置、非易失性存储器(ROM)、易失性存储器(RAM)以及非易失性存储装置(闪存或者硬盘)。由微型计算机执行基于存储在存储装置备或者内存装置中的数据和程序的各种类型的信息处理。For example, the first to fourth 20 to 23 are engine ECU, brake ECU, steering ECU, and driving assistance (navigation system) ECU. The first to
此外,本实施例的车辆网络系统被提供有用于增加通信信号的可靠性的构造。因此,第一ECU20具有监视流动到网络29的传送信号和评估传送信号的可靠性的功能,即认证主机功能。同时,第二至第四ECU21至23具有将用于认证的认证关键字等等添加到传送信号和传送具有被添加的认证关键字的传送信号的功能,以便于使得用作认证主机的第一ECU20能够认证来自于第二至第四ECU21至23的传送信号。下面将会描述第二至第四ECU21至23的配置。Furthermore, the vehicle network system of the present embodiment is provided with a configuration for increasing the reliability of communication signals. Therefore, the
第一ECU20被提供有密钥生成单元31,该密钥生成单元31生成形成一对的私密密钥K1和公开密钥K2;和私密密钥保留单元32,该私密密钥保留单元32保持由密钥生成单元31生成的私密密钥K1。第一ECU20也被提供有连接ECU管理单元33,每次车辆10启动时,该连接ECU管理单元33登记和管理被连接到网络29的ECU;和关键字认证单元34,该关键字认证单元34基于通过公开密钥K2加密的认证关键字执行传送信号的可靠性的评估(认证)处理。The
密钥生成单元31形成在诸如RSA加密的、使能加密和数字签名的公开密钥加密系统中使用的一对私密密钥K1和公开密钥K2(密钥对),并且例如使用通过RSA加密系统指定的计算方法来生成要被用于RSA加密的密钥对。因此,在密钥对被用于加密的情况下,能够利用公开密钥K2加密纯文本,并且加密的纯文本能够由私密密钥K2解码。此外,在密钥对被用于数字签名的情况下,由私密密钥K1加密的纯文本能够由公开密钥K2解码。The
此外,在执行车辆网络系统的初始化条件下执行通过密钥生成单元31的密钥对的生成。在密钥生成单元31已经生成一对私密密钥K1和公开密钥K2作为密钥对之后,将生成的公开密钥K2传送到网络29一次,即,使公开密钥K2公开一次。因此,在本实施例中,在已经执行车辆网络系统的初始化的条件下,在车辆网络系统中使公开密钥K2仅公开一次,并且不像在因特网上使用的典型的公开密钥一样始终公开。Furthermore, the generation of the key pair by the
用作密钥生成单元31生成密钥对的条件的车辆网络系统的初始化是为了激活所配置的车辆网络系统而关于车辆网络系统执行的初始化处理。例如,仅当电池被连接到车辆以用于装运时或者当由汽车经销商执行伴随有车辆网络系统的重新配置的车辆准备时,有目的地执行车辆网络系统的初始化。在其它情况下,例如,当通过点火密钥等等启动车辆以使用车辆时,或者当更换电池而与车辆网络系统的重新配置没有任何关系时,没有执行车辆网络系统的初始化并且因此,没有执行通过密钥生成单元31生成密钥对。The initialization of the vehicle network system used as a condition for the
当生成了密钥对并且仅在第一ECU20中可用地保持私密密钥时,私密密钥保留单元32从密钥生成单元31接收在由密钥生成单元31生成的一对密钥当中的私密密钥K1。When a key pair is generated and a secret key is usably held only in the
每次在随着利用点火密钥等等启动车辆10的操作之后启动车辆网络系统时,连接ECU管理单元33经由网络29接收包括由ECU传送的、关于各个ECU的识别信息的认证关键字43。然后连接ECU管理单元33确定基于从接收到的认证关键字43获得的识别信息指定的ECU被连接到网络29,将此ECU登记在连接列表331中,并且在车辆网络系统的操作期间可用地管理在第一ECU20中的连接列表331。在本实施例中,认证关键字43由公开密钥K2加密,但是由已经被保持在私密密钥保留单元32中的私密密钥K1解码,从而使其能够获取被包括在其中的ECU识别信息。The connection
必要时,关键字认证单元34利用被保持在私密密钥保留单元32中的私密密钥K1对通过公开密钥K2加密的认证关键字43解码。此外,关键字认证单元34监视在网络29中流动的传送信号并且获取已经被添加到传送信号的认证关键字43。在本实施例中,认证关键字43的部分(提取关键字)被添加到传送信号。因此,从传送信号获取认证关键字43的一部分,并且获取的部分认证关键字43被顺序地连接到具有相同的“CAN ID”的传送信号,从而重新配置完整大小的重新配置的认证关键字341。The
此外,关键字认证单元34将完整大小的重新配置的认证关键字341与被保持在连接ECU管理单元33中的认证关键字43比较。关键字认证单元34可以在重新配置的认证关键字341和认证关键字43仍被加密的同时执行比较,或者可以在解码之后执行比较。结果,验证已经传送了传送信号的ECU是否是已经传送了在连接列表331中管理的认证关键字43的ECU。因此,当重新配置的认证关键字341匹配认证关键字43时,已经传送了传送信号的ECU被验证为是已经传送了在连接列表331中管理的认证关键字43的ECU。同时,在重新配置的认证关键字341和认证关键字43不匹配的情况下,意味着由于未认证的访问等等,不正确的传送信号已经被添加到网络29,并且确定不能确保传送信号的可靠性。Furthermore, the
此外,当重新配置的认证关键字341和认证关键字43不匹配时,关键字认证单元34确定重新配置的认证关键字341未认证并且禁止利用具有被添加的重新配置的认证关键字341的“CAN ID”的传送信号。例如,关键字认证单元34禁止在车辆网络系统中使用已经被分配了禁止使用的“CAN ID”的ECU,或者向网络29传播(通知)指示传送信号未认证的信息,从而从车辆网络系统切断作为禁止对象的ECU或者使系统忽略作为禁止对象的传送信号。结果,具有作为禁止对象的“CAN ID”的传送信号没有流入网络29中或者从而不被处理。此外,在关键字认证单元34将作为禁止对象的“CAN ID”传送到网络29的情况下,作为禁止对象的“CAN ID”被传输到第二至第四ECU21至23并且禁止在ECU中使用具有作为禁止对象的“CAN ID”的传送信号。Furthermore, when the reconfigured
下面将会解释与在第二至第四ECU21至23中的传送信号的可靠性的评估有关的功能。因为第二至第四ECU21至23具有相同的功能,所以下面仅提供关于第二ECU21的解释。为了方便解释,当解释第三和第四ECU22和23时,相同和相对应的功能被指派有相同的附图标记并且在此省略其详细解释。Functions related to evaluation of reliability of transmission signals in the second to
第二ECU21被提供有:公开密钥保留单元41,该公开密钥保留单元41接收并保持从第一ECU20传送的公开密钥K2;和认证关键字生成和保留单元42,该认证关键字生成和保留单元42通过使用公开密钥K2生成和保持认证关键字43。第二ECU21也被提供有:车辆信息数据44,该车辆信息数据44由车辆速度、引擎温度、或者通过ECU获得的处理结果构成;认证关键字添加单元45,该认证关键字添加单元45将认证关键字43的部分顺序地添加到车辆信息数据44。The
当执行车辆网络系统的初始化时,公开密钥保留单元41获取从第一ECU20传送的公开密钥K2,保留获取的公开密钥K2,并且使能其在第二ECU21中的使用。When performing initialization of the vehicle network system, the public
如在图2中所示,认证关键字生成和保留单元42通过使用已经被保持在公开密钥保留单元41中的公开密钥K2,对例如作为能够指定第二ECU21的本质信息的ECU名称211或者序列号212中的至少一个的信息加密(214),并且生成和保持认证关键字43。此外,每次随着利用点火密钥启动车辆之后启动车辆网络系统时,认证关键字生成和保持单元42将已经被保持在其中的认证关键字43传送到网络29。从而第二ECU21将第二ECU21的认证关键字43登记在第一ECU20的连接ECU管理单元33的连接列表331中。As shown in FIG. 2 , the authentication key generating and retaining
车辆信息数据44表示在车辆速度、引擎温度、或者通过ECU获得的处理结果当中的车辆信息之一;一种类型的车辆信息数据44事先与一个“CAN ID”相关联。结果,在车辆网络系统中,通过参考“CANID”,假如不存在未认证的访问,能够正确地指定被包括在车辆信息数据44中的车辆信息的类型和已经传送了该车辆信息数据44的ECU。The
认证关键字添加单元45将作为认证关键字43的一部分的提取关键字顺序地添加到从第二ECU21传送并且具有被指派的“CAN ID”的车辆信息数据44。更加具体地,如在图3A中所示,认证关键字添加单元45在认证关键字43的随机位置处设定“提取开始点”,并且通过从“提取开始点”以预定的比特数顺序地提取关键字,来获取提取关键字431至43n作为n条认证信息。在这样的情况下,重复“提取关键字”的提取(获取),直到提取位置到达认证关键字43的末尾,并且这时提取位置返回到认证关键字43的开始,并且重复“提取关键字”的提取(获取),直到提取位置达到“提取开始点”。从而从认证关键字43中,n次(预定的数目)提取预定比特数的提取关键字431至43n。然后,如在图3B中所示,认证关键字添加单元45将一个提取关键字431(至43n)顺序添加到车辆信息数据44。通过这样将一个提取关键字431(至43n)顺序地添加到车辆信息数据44,通过与添加认证关键字43本身的情况相比较,能够减少被传送的数据的量。The authentication
结果,车辆信息数据44和提取关键字431(至43n)被传送到通信单元30,在通信单元30中向其添加CAN ID215和序号216,创建了由CAN协议的数据格式构成的传送信号,并且所创建的传送信号被传送到网络29。As a result, the
能够随机地设定上述“提取开始点”。例如,能够相对于公开密钥K2的比特行通过排他OR(XOR)来顺序地计算相邻的比特,并且在计算结果的比特数变成等于预定的所期待的比特数的时间点处获得计算结果。然后“提取开始点”被设定到通过从认证关键字43的报头比特位移到以上述方式已经获得的计算结果值获得的位置。The aforementioned "extraction start point" can be set randomly. For example, it is possible to sequentially calculate adjacent bits by exclusive OR (XOR) with respect to the bit row of the public key K2, and obtain the calculation at a point in time when the number of bits of the calculation result becomes equal to a predetermined expected number of bits result. The "extraction start point" is then set to a position obtained by bit-shifting from the header of the
下面将会参考图4至图7解释以上述方式配置的车辆网络系统的操作。如在图4A中所示,在已经构造了车辆网络系统之后,执行系统初始化处理以激活系统(图4A中的步骤S10)。在系统初始化处理中,如在图5A中所示,作为认证主机ECU的第一ECU20生成一对私密密钥K1和公开密钥K2(图5中的步骤S11)。第一ECU20将生成的私密密钥K1保持在其私密密钥保持单元32中,并且经由网络29将公开密钥K2分发到第二至第四ECU21至23(图5中的步骤S12)。已经设定了公开密钥K2的第二至第四ECU21至23在设定公开密钥K2的定时处基于设定的公开密钥K2创建各自的认证关键字43并且保持所创建的认证关键字(图5中的步骤S13)。当上述处理被完成时,系统初始化处理的执行结束。The operation of the vehicle network system configured in the above manner will be explained below with reference to FIGS. 4 to 7 . As shown in FIG. 4A , after the vehicle network system has been constructed, a system initialization process is performed to activate the system (step S10 in FIG. 4A ). In the system initialization process, as shown in FIG. 5A , the
在执行车辆网络系统的初始化之后以通常的方式启动车辆网络系统的情况下,如在图4B中所示,车辆网络系统执行连接管理处理(图4B中的步骤S20)并且然后执行数据认证处理(图4B中的步骤S30)。In the case of starting the vehicle network system in a usual manner after performing initialization of the vehicle network system, as shown in FIG. 4B , the vehicle network system performs connection management processing (step S20 in FIG. 4B ) and then performs data authentication processing ( Step S30 in Fig. 4B).
在连接管理处理中,如在图6中所示,随着车辆网络系统启动之后,通过第一至第四ECU21至23保持的认证关键字43被传送到网络29(图6中的步骤S21)。第一ECU20接收第二至第四ECU21至23的认证关键字43,利用私密密钥K1解码接收到的认证关键字,指定作为传送源的ECU(图6中的步骤S22)并且也将认证关键字43与被指定的ECU相关联并且将其登记在连接列表331中(图6中的步骤S23)。结果,由此在执行车辆网络系统的初始化期间不能够获取公开密钥K2的ECU,例如,在已经执行车辆网络系统的初始化之后连接的ECU,将不会被登记在连接列表331中,从而使得能够区别还没有被认证连接到网络29的ECU。In the connection management process, as shown in FIG. 6 , the
在数据认证处理中,如在图7中所示,第二至第四ECU21至23传送具有被添加的提取关键字431(至43n)的传送信号(图7中的步骤S31)。第一ECU20监视具有被添加的提取关键字的传送信号,并且将通过对于各个“CAN ID”顺序获取和重新配置提取关键字431(至43n)而获得的重新配置的认证关键字341与已经被保持在连接列表331中的认证关键字43比较,从而验证传送信号的可靠性(图7中的步骤S32)。因此,当重新配置的认证关键字341和认证关键字43匹配(图7中的步骤S33中为是)时,第一ECU20确定重新认证关键字341是合适的并且继续监视传送信号(图7中的步骤S34)。In the data authentication process, as shown in FIG. 7 , the second to
同时,当重新配置的认证关键字341和认证关键字43不匹配(在图7中的步骤S33中为否)时,第一ECU20确定重新配置的认证关键字341未认证并且从车辆网络系统切断具有被添加有的重新配置的认证关键字341的“CAN ID”的ECU(在图7中的步骤S35).第一ECU20也禁止在第二至第四ECU21至23中使用具有作为禁止对象的“CANID”的传送信号(图7中的步骤S36)。Meanwhile, when the reconfigured
结果,在本实施例的车辆网络系统中,第一ECU20监视被传送到网络29的传送信号是否包括已经将“CAN ID”添加到不合适的数据的传送信号,该“CAN ID”由第二至第四ECU21至23添加到该传送信号。当假的传送信号被包括在传送信号中时,第一ECU20确定假信号并且禁止在网络29中使用假传送信号。As a result, in the vehicle network system of the present embodiment, the
如在上面所提及的,利用本实施例的车辆网络系统能够获得下述效果。(1)因为当执行车辆网络系统的初始化处理时在第二至第四ECU21至23中设定公开密钥K2,将传送信号与提取关键字431至43n一起传送的第二至第四ECU21至23被指定为当执行初始化处理时已经被包括在车辆网络系统中的单元。结果,在向其添加提取关键字431至43n时传送的传送信号被指定为从在执行初始化处理时已经被包括在车辆网络系统中的第二至第四ECU21至23传送的传送信号。结果,能够增加传送信号的可靠性。As mentioned above, with the vehicle network system of the present embodiment, the following effects can be obtained. (1) Since the public key K2 is set in the second to
(2)此外,在存储了已经创建的提取关键字431至43n(认证关键字43)的情况下,没有必要再次创建提取关键字431至43n。因此,在传送信号的后续传送期间,不存在创建提取关键字431至43n所需的负载增加并且能够将第二至第四ECU21至23的处理性能维持在常规水平处。(2) Furthermore, in the case where already created
(3)此外,因为通过公开密钥K2已经加密的提取关键字431至43n的内容还没有被篡改,所以具有被添加的提取关键字的传送信号的可靠性也增加。(3) Furthermore, since the contents of the
(4)因为在划分时传送提取关键字431至43n(认证关键字43),所以通过与将所有的提取关键字431至43n添加到要被传送的各个传送信号的情况相比较,能够减少被认为是需要确保可靠性的通信数据的量。特别地,通过被设计有最小的必要容量和功能的车辆网络系统,传送信号的可靠性能够增加,同时抑制与用于增加传送信号的可靠性的功能增强相关联的成本增加。(4) Since the
(5)因为第一ECU20在执行初始化处理期间生成私密密钥K1和公开密钥K2,所以私密密钥K1和公开密钥K2不能被事先泄露。(6)因为在初始化处理期间分发公开密钥K2,所以公开密钥K2能够被精确地和有效地分发到构成车辆网络系统的适当的第二至第四ECU21至23。(5) Since the
(7)因为当设定公开密钥K2时创建提取关键字431至43n(认证关键字43),所以当传送传送信号时没有产生用于创建提取关键字431至43n(认证关键字43)的处理负载,并且能够抑制在第二至第四ECU21至23中的处理负载增加。(7) Since the
(8)每次车辆网络系统被启动时,第一ECU20通过在传送信号的传送之前传送的认证关键字43来认证第二至第四ECU21至23,该第二至第四ECU21至23传送需要评估可靠性的传送信号,从而使得能够执行传送信号的可靠性评估,其不受例如系统配置中的变化影响。此外,在这样的情况下,不要求将传送需要评估可靠性的传送信号的第二至第四ECU21至23事先登记在第一ECU20中。因此,系统的柔韧性也增加。(8) Every time the vehicle network system is activated, the
(9)当冒充是第二至第四ECU21至23的装置被连接到车辆网络系统并且未认证的信号(假信号)被传送到车辆网络系统时,因为未认证的信号被禁止使用,所以防止未认证的信号影响车辆网络系统。结果,能够防止未认证的信号在车辆网络系统中引起不便。(9) When a device pretending to be the second to
(第二实施例)(second embodiment)
下面将会参考图8和图9描述根据本发明的车辆网络系统的第二实施例。本实施例与上述第一实施例之间的主要不同在于,根据需要,与传送信号分开地传送使能传送信号的可靠性评估的认证信号。因此,下面将会主要地描述在本实施例与上述第一实施例之间的不同,为了便于解释,相同的构件将会被指派有相同的附图标记并且其解释将会被省略。A second embodiment of the vehicle network system according to the present invention will be described below with reference to FIGS. 8 and 9 . The main difference between the present embodiment and the first embodiment described above is that an authentication signal that enables reliability evaluation of a transmission signal is transmitted separately from the transmission signal, as necessary. Therefore, differences between the present embodiment and the first embodiment described above will be mainly described below, and for convenience of explanation, the same components will be assigned the same reference numerals and explanations thereof will be omitted.
第一ECU20的通信单元30与上述第一实施例的通信单元30相类似,但是在本实施例中,如在图9中所示,“XX”被设定为用于添加到用作通信信号的传送信号TD10的“CAN ID”的值,并且“YY”也被设定为用于添加到加密信号TS10的“CAN ID”的值。此值“YY”是与值“XX”相关联的标识符,并且在车辆网络系统中,加密信号TS10被事先定义为所谓的认证信号,该认证信号是用于评估具有值“XX”的传送信号TD10的可靠性,在加密信号TS10中,值“YY”被设定在“CAN ID”中。The
如在图8中所示,在用作第一控制单元的第一ECU20中提供:密钥生成单元31,其生成形成一对的私密密钥K1和公开密钥K2;和私密密钥保持单元32,其保持由密钥生成单元31生成的私密密钥K2。此外,第一ECU20也被提供有车辆信息数据35,该车辆信息数据35由车辆速度、引擎温度、或者利用ECU获得的处理结果构成;认证数据生成单元36,该认证数据生成单元36生成用于认证车辆信息数据35的传送源的认证数据;以及加密数据创建单元37,该加密数据创建单元37从认证数据创建用作认证信号的加密数据。As shown in FIG. 8, provided in the
以与上述第一实施例相同的方式,密钥生成单元31形成在诸如RSA加密的、使能加密和数字签名的公开密钥加密系统中使用的一对私密密钥K1和公开密钥K2(密钥对),并且例如使用通过RSA加密系统指定的计算方法以生成要被用于RSA加密的密钥对。因此,在密钥对被用于加密的情况下,能够利用公开密钥K2加密纯文本,并且加密的纯文本能够由私密密钥K2解码。此外,在密钥对被用于数字签名的情况下,由私密密钥K1加密的纯文本能够由公开密钥K2解码。In the same manner as in the first embodiment described above, the
车辆信息数据35表示来自于车辆速度、引擎温度、或者利用ECU获得的处理结果当中的任何类型的车辆信息,并且一个“CAN ID”事先与一种类型的车辆信息数据35相关联。结果,在车辆网络系统中,通过参考“CAN ID”,假如不存在未认证的访问,能够正确地指定被包括在车辆信息数据35中的车辆信息的类型和已经传送了车辆信息数据35的ECU(例如,第一ECU20)。The
认证数据创建单元36将通过使用预定的哈希函数获得的车辆信息数据35的哈希值作为用于认证车辆信息数据35的传送源是第一ECU20的认证数据。哈希函数从车辆信息数据35生成事先已经确定的伪随机数字(哈希数字、消息摘要)。理论上,非常难以生成具有相同的哈希值的数据(例如,不合适的车辆信息数据)。因此,例如,能够确保通过哈希函数创建的认证数据是从车辆信息数据35创建的。The authentication
加密数据生成单元37基于被保持在私密密钥保留单元32中的私密密钥K1从认证数据生成加密数据。因为仅通过公开密钥K2解码加密数据,在能够通过公开密钥K2解码加密数据的情况下,能够确保通过第一ECU20已经生成了这些公共数据。The encrypted
下面将会解释与被设置在用作第二控制单元的第二ECU21中的、与评估传送信号TD10的可靠性的功能有关的配置。第三和第四ECU22和23不同于第二控制单元之处在于,它们未被提供有评估传送信号的可靠性的功能,但是其它功能与第二ECU21类似并且因此在此省略其解释。The configuration related to the function of evaluating the reliability of the transmission signal TD10 provided in the
第二ECU21被提供有公开密钥保留单元41,该公开密钥保留单元41接收并保持从第一ECU20传送的公开密钥K2。第二ECU21也被提供有:接收数据保留单元50,该接收数据保留单元50保持被包括在由第一ECU20传送的传送信号TD10中的车辆信息数据35;和认证数据再生单元51,该认证数据再生单元51基于被保持在接收数据保留单元50中的车辆信息数据35再生认证数据。第二ECU21被进一步提供有:加密数据保留单元52,该加密数据保留单元52保留被包括在通过第一ECU传送的加密信号TS10中的加密数据;和信号可靠性评估单元53,该信号可靠性评估单元53基于由认证数据再生单元51再生的认证数据和从加密数据解码的认证数据评估传送信号TD10的可靠性。The
接收数据保留单元50获取并保留已经由已经接收到由第一ECU20传送的传送信号TD10的通信单元30从传送信号TD10取出的车辆信息数据35。The received data holding unit 50 acquires and holds the
认证数据再生单元51具有与第一ECU20生成认证数据所使用的哈希函数相同的哈希函数,并且通过使用该哈希函数生成被保持在接收数据保留单元50中的车辆信息数据35的哈希值(消息摘要)。因此,接收数据保留单元50生成再生认证数据,该再生认证数据是基于车辆信息数据35和第一ECU20生成认证数据所使用的哈希函数再生的认证数据。通常,如果不存在未认证的访问,则接收数据保留单元50生成与由第一ECU20生成的认证数据相同的再生认证数据。The authentication data reproduction unit 51 has the same hash function as that used by the
加密数据保留单元52获取并保留加密数据,该加密数据由已经接收到由第一ECU20传送的加密信号TS10的通信单元30通过从加密信号TS10去除被认为是对于通信必要的“CAN ID”来取出。因此,保持了基于由第一ECU20生成的认证数据生成的加密数据。The encrypted
通过基于保持在公开密钥保留单元41中的公开密钥K2将保持在加密数据保留单元52中的加密数据解码,可靠性评估单元53获取解码认证数据,该解码认证数据是由第一ECU20生成的认证数据。因为由公开密钥K2解码的加密数据仅是已经由第一ECU20的私密密钥K1加密的加密数据,所以确保能够由公开密钥K2适当地解码的加密数据是使用私密密钥K1加密的数据,即,由第一ECU20加密的数据。By decoding the encrypted data held in the encrypted
然后可靠性评估单元53基于通过将加密数据解码获得的解码认证数据与认证数据再生单元51的再生认证数据的比较评估传送信号TD10的可靠性。结果,在解码认证数据和再生认证数据匹配的情况下,确保解码认证数据是由第一ECU20传送的。因此,也确保用于再生再生认证数据的车辆信息数据35是从第一ECU20传送的。此外,因为用作认证数据的哈希值匹配,所以也确保由第一ECU20作为传送信号TD10传送的纯文本数据(车辆信息数据35)没有在途中被篡改为不同的数据。The
下面将会参考图10和图11解释上述配置的车辆网络系统的操作。如在图9中所示,第一ECU20在车辆网络系统被初始化时在密钥生成单元31中生成一对私密密钥K1和公开密钥K2,并且将生成的私密密钥K1保持在私密密钥保留单元32中。同时,第一ECU20将生成的公开密钥K2传送到网络29并且将公开密钥设定到第二ECU21。在本实施例中,第三和第四ECU22和23不要求从第一ECU20传送的传送信号的可靠性评估。因此,没有设定由第一ECU20生成的公开密钥K2。The operation of the above-configured vehicle network system will be explained below with reference to FIGS. 10 and 11 . As shown in FIG. 9 , the
在这样的初始化处理已经结束之后,启动车辆网络系统并且将要求可靠性评估的传送信号TD10从第一ECU20传送到第二ECU21。传送信号TD10是由普通的CAN协议格式构造的信号并且具有CAN ID的值“XX”和纯文本数据(车辆信息数据35)的值“123...”。在传送信号TD10被传送到网络29的情况下,被连接到相同网络29的第二至第四ECU21至23接收由CAN ID的值“XX”和纯文本数据的值“123...”构成的接收信号RD11至RD13。After such initialization processing has ended, the vehicle network system is activated and a transmission signal TD10 requiring reliability evaluation is transmitted from the
然而,在本实施例中,第一ECU20在传送传送信号TD10之前,将用于传送信号TD10的可靠性评估的加密信号TS10传送到网络29。因此,如在图10中所示,第一ECU20生成是纯文本数据的车辆信息数据35的哈希值(消息摘要)作为认证数据(图10中的步骤S40),并且生成加密信号TS10(图10中的步骤S41),该加密信号TS10包括通过利用私密密钥K1对所生成的认证数据加密获得的加密数据。例如,通过对从纯文本数据“123...”生成的认证数据加密获得作为认证数据的“608...”。然后,创建加密信号TS10,其以具有CAN ID值“YY”和加密数据值“608...”的CAN协议格式构造。在创建加密信号TS10的情况下,第一ECU20传送所创建的加密信号TS10(图10中的步骤S42),并且也传送是与加密信号TS10相对应的普通信号的传送信号TD10(图10中的步骤S43)。结果,结束由第一ECU20执行的传送信号TD10的传送和用于评估传送信号的可靠性的加密信号TS10的传送。However, in the present embodiment, the
同时,第二ECU21接收传送信号TD10和加密信号TS10并且也基于接收到的传送信号TD10和加密信号TS10评估传送信号TD10的可靠性。因此,如在图11中所示,第二ECU21接收加密信号TS10(图11中的步骤S50)。通过接收加密信号TS10,第二ECU21能够预测具有与加密信号TS10的CAN ID值“YY”相对应的CAN ID值“XX”的传送信号TD10的传送。当接收到加密信号TS10时,第二ECU21对加密信号TS10解码并且获得解码认证数据(图11中的步骤S51)。此外,第二ECU21从与加密信号TS10相对应的传送信号TD10获得纯文本数据(车辆信息数据35)(图11中的步骤S52)并且也生成纯文本数据(车辆信息数据35)的哈希值(消息摘要)作为再生认证数据(图11中的步骤S53)。在获得解码认证数据(消息摘要)和再生认证数据(消息摘要)的情况下,第二ECU21将这些解码认证数据与再生认证数据相比较(图11中的步骤S54)。当比较结果指示解码认证数据与再生认证数据匹配时(图11中的步骤S55中为是)时,传送信号TD10被确定为是合适的(在图11中步骤S56)。同时,当比较结果指示解码认证数据和再生认证数据不匹配(图11中的步骤S55中为否)时,传送信号TD10被确定为是未认证的(图11中的步骤S57)。结果,评估了传送信号TD10的可靠性。从而完成由第一ECU20传送的传送信号TD10的可靠性评估。Meanwhile, the
如上所提及的,利用本实施例的车辆网络系统能够获得下述效果。As mentioned above, with the vehicle network system of the present embodiment, the following effects can be obtained.
(10)因为当执行初始化处理时设定公开密钥K2,所以传送公开密钥K2的第一控制单元被指定为当执行初始化处理时已经被包括在车辆网络系统中的单元。此外,通过将从传送信号TD10生成的再生认证数据与通过将第一ECU20的加密数据从加密信号TS10解码获得的解码认证数据相比较,第二ECU21能够确定传送信号TD10的传送源是第一ECU20,并且没有向传送信号TD10添加篡改。例如,即使在网络29中流动的传送信号TD10已经被篡改,因为与其相对应的加密信号TS10的认证数据(加密数据)不能够被篡改,能够检测到传送信号TD10的篡改。结果,能够检测到从冒充第一ECU20的装置传送的假信号并且能够增加通信信号的可靠性。(10) Since the public key K2 is set when the initialization process is performed, the first control unit that transmits the public key K2 is designated as a unit already included in the vehicle network system when the initialization process is performed. Furthermore, by comparing the reproduction authentication data generated from the transmission signal TD10 with the decoded authentication data obtained by decoding the encrypted data of the
(11)此外,传送信号TD10本身也被从第一ECU20传送到网络。因此,没有评估传送信号TD10的可靠性的第三和第四ECU22和23能够以常规方式从第一ECU20接收和使用传送信号TD10。因此,评估传送信号TD10的可靠性的系统能够被容易地应用于现在存在的车辆网络系统。(11) Furthermore, the transmission signal TD10 itself is also transmitted from the
(12)哈希函数使其能够从传送信号TD10,特别地从车辆信息数据35,计算适当大小(强度)的认证数据。结果,设计车辆网络系统时的柔韧性增加。(12) The hash function makes it possible to calculate authentication data of an appropriate size (strength) from the transmission signal TD10 , particularly from the
(13)因为第一ECU20在执行初始化处理时生成私密密钥K1和公开密钥K2,因此防止事先泄露私密密钥K1和公开密钥K2。(14)因为在初始化处理期间分发公开密钥K2,所以公开密钥K2能够被精确地和有效地分发到构成车辆网络系统的适当的第二ECU21。(13) Since the
(其它实施例)也能够以下述模式实现上述实施例。(Other Embodiments) The above-described embodiments can also be implemented in the following modes.
在上述实施例中,通过示例解释了网络29是CAN的情况。然而,这样的配置不是限制,并且也能够使用适合于用作用于车辆的网络的常规网络,诸如以太网TM和FlexRayTM。此外,网络能够使用无线通信、有线通信、或者其混合。结果车辆网络系统的应用范围扩大并且设计系统中的柔韧性增加。In the above-mentioned embodiments, the case where the
在第一实施例中,解释了在设定公开密钥K2的定时处生成认证关键字43的情况,但是这样的配置不是限制,并且在任何定时处可以生成认证关键字,假如在ECU中存在剩余的处理容量,则保持公开密钥,并且生成定时是在添加到通信信号之前。In the first embodiment, the case where the
在上述实施例中,解释了使公开密钥K2仅公开一次的情况,但是这样的配置不是限制,并且可以使公开密钥公开多次,只要能够不获取在没有认证的情况下已经添加的装置。In the above-mentioned embodiment, the case where the public key K2 is made public only once is explained, but such a configuration is not a limitation, and the public key may be made public many times as long as it is possible not to acquire a device that has been added without authentication. .
在第一实施例中,解释了公开密钥K2被保持在公开密钥保留单元41中的情况,但是这样的配置不是限制,并且因为在已经生成认证关键字之后没有使用公开密钥,所以在已经生成认证关键字之后可以删除公开密钥。因为由此从第二ECU等等删除公开密钥,所以防止在公开密钥分发之后泄露公开密钥,并且通信信号的可靠性能够进一步增加。In the first embodiment, the case where the public key K2 is held in the public
在第一实施例中,解释了在传送信号中将提取关键字431(至43n)添加到车辆信息数据44后面的情况,但是这样的配置不是限制,并且提取关键字可以被添加在数据前面或者在其他位置处,只要能够维持在网络中使能通信的格式。结果,在将提取关键字添加到传送信号时的柔韧性增加,并且用于评估传送信号的可靠性的应用范围扩大。In the first embodiment, the case where the extraction key 431 (to 43n) is added after the
在第一实施例中,解释了第一ECU20评估连接到网络的所有其它的ECU(第二至第四ECU21至23)的传送信号的可靠性的情况。然而,这样的配置不是限制,并且第一ECU可以仅评估连接到网络的其它ECU中的一些(一个或者多个)的通信信号的可靠性。在这样的情况下,设计车辆网络系统时的柔韧性增加。例如,没有必要将提取关键字添加到除了可靠性评估对象之外的传送信号。In the first embodiment, the case where the
在第二实施例中,解释了仅通过一个ECU(第二ECU21)评估从第一ECU20传送的传送信号的可靠性的情况。然而,这样的配置不是限制,并且可以通过多个ECU(第二至第四ECU等等)评估从第一ECU传送的传送信号的可靠性。结果,在设计车辆网络系统时的柔韧性增加。In the second embodiment, the case where the reliability of the transmission signal transmitted from the
在第二实施例中,解释了在传送传送信号TD10之前由作为传送ECU的第一ECU20传送加密信号TS10,以及由作为接收ECU的第二ECU21在传送信号TD10之前接收加密信号TS10的情况。然而,这样的配置不是限制,并且传送ECU可以在传送传送信号之后传送加密信号并且接收ECU可以在传送信号之后接收加密信号。结果,设计车辆网络系统时的柔韧性增加。In the second embodiment, the case where encrypted signal TS10 is transmitted by
在第一实施例中,解释了将RSA加密用作公开密钥加密系统的情况,但是这样的配置不是限制,并且能够使用其它常规的公开密钥加密系统,只要满足使得由公开密钥加密的纯文本能够通过私密密钥被解码的关系。结果,在设计车辆网络系统时的柔韧性和其应用扩大。In the first embodiment, the case of using RSA encryption as the public key encryption system was explained, but such a configuration is not restrictive, and other conventional public key encryption systems can be used as long as the requirements for encryption by the public key are satisfied. A relation in which plain text can be decoded with a private key. As a result, flexibility in designing vehicle network systems and their applications expands.
在第二实施例中,解释了将RSA加密用作公开密钥加密系统的情况,但是这样的配置不是限制,并且能够使用其它常规的公开密钥加密方法,只要满足使得由公开密钥加密的纯文本能够通过私密密钥被解码的关系,即,只要该系统能够被用于数字签名。结果,在设计车辆网络系统时的柔韧性和其应用扩大。In the second embodiment, the case where RSA encryption is used as the public key encryption system is explained, but such a configuration is not limited, and other conventional public key encryption methods can be used as long as the conditions for encryption by the public key are satisfied. The relation that plain text can be decoded by a private key, ie, as long as the system can be used for digital signatures. As a result, flexibility in designing vehicle network systems and their applications expands.
在第一实施例中,解释了认证主机仅是第一ECU20的情况,但是这样的配置不是限制,并且可以提供多个认证主机。结果,能够将车辆网络系统的安全维持在较高水平。In the first embodiment, the case where the authentication host is only the
在第一实施例中,解释了第一ECU20连续地评估传送信号的可靠性的情况,但是这样的配置不是限制,并且可以适当地执行传送信号的评估和可靠性。例如,可以在网络中流动的传送信号的频率异常地改变时评估传送信号的可靠性。结果,能够适当地评估传送信号。In the first embodiment, the case where the
在第二实施例中,解释了将“CAN ID”值“YY”与对应于传送信号TD10的加密信号TS10相关联的情况,但是这样的配置不是限制,并且也可以根据预定的规则改变在与传送信号相对应的加密信号中使用的“CAN ID”值。结果,“CAN ID”的欺骗性使用和使用“CAN ID”的欺骗能够变得更加困难。In the second embodiment, the case of associating the "CAN ID" value "YY" with the encrypted signal TS10 corresponding to the transmission signal TD10 was explained, but such a configuration is not a limitation, and can also be changed according to a predetermined rule. The "CAN ID" value used in the encrypted signal corresponding to the transmitted signal. As a result, deceptive use of "CAN ID" and spoofing using "CAN ID" can become more difficult.
在第二实施例中,解释了通过使用哈希函数生成认证数据的情况,但是这样的配置不是限制,并且可以根据预定的计算规则生成认证数据。结果,在设计车辆网络系统时的柔韧性增加。In the second embodiment, the case where authentication data is generated by using a hash function is explained, but such a configuration is not a limitation, and authentication data may be generated according to a predetermined calculation rule. As a result, flexibility is increased when designing vehicle network systems.
在上述实施例中,解释了通过第一ECU20生成密钥对的情况,但是这样的配置不是限制,并且也可以使用事先生成的密钥对。在使用事先生成的密钥对的情况下,其可以被事先分发给各个ECU。结果,在设计车辆网络系统时的柔韧性增加。In the above-described embodiments, the case where the key pair is generated by the
Claims (12)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2011-048020 | 2011-03-04 | ||
JP2011048020A JP5310761B2 (en) | 2011-03-04 | 2011-03-04 | Vehicle network system |
PCT/IB2012/000389 WO2012120350A2 (en) | 2011-03-04 | 2012-03-02 | Vehicle network system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103404112A true CN103404112A (en) | 2013-11-20 |
CN103404112B CN103404112B (en) | 2016-11-30 |
Family
ID=
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104917606A (en) * | 2014-03-11 | 2015-09-16 | 通用汽车环球科技运作有限责任公司 | Password encryption for controlling access to electronic control units |
CN106143364A (en) * | 2016-07-22 | 2016-11-23 | 北京航空航天大学 | A kind of electric automobile distributed director information security method and system |
CN106576096A (en) * | 2014-06-17 | 2017-04-19 | 思科技术公司 | Authentication of devices having unequal capabilities |
CN106603483A (en) * | 2015-10-19 | 2017-04-26 | 丰田自动车株式会社 | Vehicle system and authentication method |
CN107395339A (en) * | 2016-05-17 | 2017-11-24 | 罗伯特·博世有限公司 | Method for generating secret or key in a network |
CN108141357A (en) * | 2015-10-15 | 2018-06-08 | 罗伯特·博世有限公司 | For generating secret circuit device in a network |
CN110708192A (en) * | 2019-09-27 | 2020-01-17 | 上海赫千电子科技有限公司 | Vehicle-mounted management system and method applied to addable equipment |
CN110915170A (en) * | 2017-05-18 | 2020-03-24 | 博世株式会社 | Ecu |
CN111447235A (en) * | 2013-12-12 | 2020-07-24 | 日立汽车系统株式会社 | Network device and network system |
CN111788811A (en) * | 2018-01-29 | 2020-10-16 | 耐瑞唯信有限公司 | Secure communication between on-board electronic control units |
CN111817849A (en) * | 2020-06-30 | 2020-10-23 | 宝能(广州)汽车研究院有限公司 | Electronic control unit ECU and safe communication method and system thereof |
CN111935317A (en) * | 2020-09-27 | 2020-11-13 | 恒大新能源汽车投资控股集团有限公司 | Vehicle information verification method and device and computer-readable storage medium |
CN113497704A (en) * | 2020-04-01 | 2021-10-12 | 罗伯特·博世有限公司 | Vehicle-mounted key generation method, vehicle and computer-readable storage medium |
CN113923052A (en) * | 2015-07-03 | 2022-01-11 | 阿费罗有限公司 | Apparatus and method for establishing a secure communication channel in an internet of things (IoT) system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070118752A1 (en) * | 2004-04-29 | 2007-05-24 | Bayerische Motoren Werke Aktiengesellschaft | Authentication of control units in a vehicle |
CN101135905A (en) * | 2006-09-01 | 2008-03-05 | 株式会社电装 | Vehicle information rewriting system |
US20090119657A1 (en) * | 2007-10-24 | 2009-05-07 | Link Ii Charles M | Methods and systems for software upgrades |
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070118752A1 (en) * | 2004-04-29 | 2007-05-24 | Bayerische Motoren Werke Aktiengesellschaft | Authentication of control units in a vehicle |
CN101135905A (en) * | 2006-09-01 | 2008-03-05 | 株式会社电装 | Vehicle information rewriting system |
US20090119657A1 (en) * | 2007-10-24 | 2009-05-07 | Link Ii Charles M | Methods and systems for software upgrades |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111447235A (en) * | 2013-12-12 | 2020-07-24 | 日立汽车系统株式会社 | Network device and network system |
CN104917606B (en) * | 2014-03-11 | 2019-05-28 | 通用汽车环球科技运作有限责任公司 | For controlling the password encryption to access to electronic control unit |
CN104917606A (en) * | 2014-03-11 | 2015-09-16 | 通用汽车环球科技运作有限责任公司 | Password encryption for controlling access to electronic control units |
CN106576096B (en) * | 2014-06-17 | 2019-12-13 | 思科技术公司 | Apparatus, method, and medium for authentication of devices with unequal capability |
CN106576096A (en) * | 2014-06-17 | 2017-04-19 | 思科技术公司 | Authentication of devices having unequal capabilities |
CN113923052A (en) * | 2015-07-03 | 2022-01-11 | 阿费罗有限公司 | Apparatus and method for establishing a secure communication channel in an internet of things (IoT) system |
CN108141357A (en) * | 2015-10-15 | 2018-06-08 | 罗伯特·博世有限公司 | For generating secret circuit device in a network |
CN108141357B (en) * | 2015-10-15 | 2022-03-18 | 罗伯特·博世有限公司 | Circuit arrangement for generating a secret in a network |
CN106603483A (en) * | 2015-10-19 | 2017-04-26 | 丰田自动车株式会社 | Vehicle system and authentication method |
CN106603483B (en) * | 2015-10-19 | 2020-05-01 | 丰田自动车株式会社 | Vehicle Systems and Authentication Methods |
CN107395339A (en) * | 2016-05-17 | 2017-11-24 | 罗伯特·博世有限公司 | Method for generating secret or key in a network |
CN106143364B (en) * | 2016-07-22 | 2019-06-11 | 北京航空航天大学 | A kind of electric vehicle distributed controller information security method and system |
CN106143364A (en) * | 2016-07-22 | 2016-11-23 | 北京航空航天大学 | A kind of electric automobile distributed director information security method and system |
CN110915170A (en) * | 2017-05-18 | 2020-03-24 | 博世株式会社 | Ecu |
CN110915170B (en) * | 2017-05-18 | 2021-11-16 | 博世株式会社 | Ecu |
US11916924B2 (en) | 2018-01-29 | 2024-02-27 | Nagravision S.A. | Secure communication between in-vehicle electronic control units |
CN111788811B (en) * | 2018-01-29 | 2022-11-25 | 耐瑞唯信有限公司 | Secure communication between in-vehicle electronic control units |
CN111788811A (en) * | 2018-01-29 | 2020-10-16 | 耐瑞唯信有限公司 | Secure communication between on-board electronic control units |
CN110708192A (en) * | 2019-09-27 | 2020-01-17 | 上海赫千电子科技有限公司 | Vehicle-mounted management system and method applied to addable equipment |
CN110708192B (en) * | 2019-09-27 | 2022-08-19 | 上海赫千电子科技有限公司 | Vehicle-mounted management system and method applied to addable equipment |
CN113497704A (en) * | 2020-04-01 | 2021-10-12 | 罗伯特·博世有限公司 | Vehicle-mounted key generation method, vehicle and computer-readable storage medium |
CN111817849A (en) * | 2020-06-30 | 2020-10-23 | 宝能(广州)汽车研究院有限公司 | Electronic control unit ECU and safe communication method and system thereof |
CN111935317B (en) * | 2020-09-27 | 2021-01-01 | 恒大新能源汽车投资控股集团有限公司 | Vehicle information verification method and device and computer-readable storage medium |
CN111935317A (en) * | 2020-09-27 | 2020-11-13 | 恒大新能源汽车投资控股集团有限公司 | Vehicle information verification method and device and computer-readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
EP2681901A2 (en) | 2014-01-08 |
EP2681901B1 (en) | 2017-07-26 |
WO2012120350A2 (en) | 2012-09-13 |
BR112013022417B1 (en) | 2022-07-26 |
US9413732B2 (en) | 2016-08-09 |
JP2012186635A (en) | 2012-09-27 |
JP5310761B2 (en) | 2013-10-09 |
BR112013022417A2 (en) | 2016-12-13 |
WO2012120350A3 (en) | 2012-11-08 |
US20140040992A1 (en) | 2014-02-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2681901B1 (en) | Vehicle network system | |
CN109257374B (en) | Security control method and device and computer equipment | |
US20190268763A1 (en) | In-vehicle networking | |
CN109314639B (en) | Management system, key generation device, vehicle-mounted computer, management method, and recording medium | |
EP3154219A1 (en) | Communication network system, transmission node, reception node, message checking method, and computer program | |
KR20150074414A (en) | Firmware upgrade method and system thereof | |
JP6625293B2 (en) | Key management device and communication equipment | |
JP2018078484A (en) | Reuse system, key generation device, data security device, on-vehicle computer, reuse method, and computer program | |
JP2010011400A (en) | Cipher communication system of common key system | |
KR102450811B1 (en) | System for key control for in-vehicle network | |
CN111740825A (en) | A kind of authentication method and system of CAN bus multi-network node | |
CN114793184B (en) | Security chip communication method and device based on third-party key management node | |
CN112217775B (en) | Remote certification method and device | |
JP6203798B2 (en) | In-vehicle control system, vehicle, management device, in-vehicle computer, data sharing method, and computer program | |
KR102236282B1 (en) | Method and system for authenticating communication data of vehicle | |
CN116419217B (en) | OTA data upgrading method, system, equipment and storage medium | |
US20230205887A1 (en) | Secure automotive system | |
CN103404112B (en) | Vehicle network system | |
JP6830877B2 (en) | Distribution system, key generator, distribution method, and computer program | |
CN115276972A (en) | Data transmission method, storage medium and vehicle | |
CN118900174A (en) | Vehicle FlexRay bus data communication method, device and vehicle | |
WO2022009464A1 (en) | Control device and program verification method | |
WO2017216874A1 (en) | Key management device, key management program, and key sharing method | |
JP2017208731A (en) | Management system, management apparatus, in-vehicle computer, management method, and computer program | |
CN115729123A (en) | Control method and device for Electronic Control Unit (ECU) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20161130 |
|
CF01 | Termination of patent right due to non-payment of annual fee |